Posts by DryBones

Page:

Rubbish. You're creeped out by a search engine remembering your searches and history? Delete them, Google offers you that functionality in the dashboard.

Advertisers have been collecting things, using cookies of various types for more than a decade. Google is actually letting you be a user of that data too, and giving you the ability to remove a good deal of it. If it scares you, GO NUKE YOUR DATA.

The every hotel analogy is off. It's your concierge following you to each one you go to.

Names

Really, they should call these use UVs, because really they're Utility Vehicles. In order to be called a Sport Utility Vehicle, it should be required to manage a certain degree of off-road performance (Land Rover, et al), and/or speed (0-60 in under 7s). Can't see where the Sport comes in, otherwise.

Re: Huh?

This x1000.

This is the gaping, whistling hole in the story. All those third party app stores require you to manually turn on installation of third party apps that didn't go through the Play Store. Guess how many Android phones there are that use those stores. Hint: It's very close to the number of those listed as infected.

All I want to know...

Re: Still Unclear on Concept - Two faced

Might be because the bugs in that codebase have to go through the manufacturer, then the vendor, and there's a pretty high % chance that one of those two can't be arsed to pass it through because they're wanting to push the latest and greatest phones?

Fitting

The ability to 'hide' is something whose time is long past, and should be removed from all operating systems. Roll the stuff the user shouldn't care about into a 'system' category if you like, but there should be no OS-coded ability whatsoever for any program or process to conceal its presence.

Without having a firm understanding of the protocol (not a network guy, not going to be arsed to go read it), I think my first question be if the includeSubDomains flag actually did get put in as Mikhail said or not.

Seems like another of those things that would stand out like a beacon via Ghostery/NoScript/ScriptSafe.

Re: Form letters save me time being ignored!

Makes perfect sense to me. Write a letter if it's likely it'll actually be read and considered. Write a sentence to tell them which pile to put you in if a secretary or algorithm is going to be working a tally board.

This is mean and bad for the workers and all, but I cannot stop laughing. How much is it going to take for these companies to realize that hey, they should be proactive, not reactive about their security. The very fact that they are looking for these people NOW, seems like it opens them up for gross negligence suits.

I think the issue would revolve around the effect that the element has.

Back during the period that the antitrust action took place against Microsoft, IE was not only not standards compliant, but it was seriously not compliant, to the degree that a website that looked right in IE didn't work at all for anything else, including those that followed the standard. This meant that it was likely that most sites would look right on IE, but wrong other browsers unless the owners had implemented detection and presentation of separate pages/files for the browsers. It was a deliberate act, adding functions and features that aren't in the standards to break compatibility with other browsers.

Contrast that with the search issue. Different search site/plugin is going to return different results, with different priorities. Google started as a webpage, and got to be the site of choice for search. They work based on content. Search Engine Optimization got to be a thing, and if I recall properly, it's against the rules with Google. Your content should be your content, and it should be relevant, and you shouldn't be stashing a bunch of keywords to push your ranking up. Sites get caught misbehaving, get dropped in ranking until they clean up the fake bullshit they put in to push themselves up.

Not sure that you can really compare deliberately breaking standards and by extension sites, and thus making other browsers not render them properly... with crawling sites and ranking them, and demoting them if they try to fake out the rating system. Google is just doing what it does, search, and there really are other choices. I presume the other search engines do similar in terms of ranking and demotion... or maybe not, if they return a lot of keyword-bait sites at the top.

Hmm.

Windows and Linux users would appear to be immune because their operating systems don't accept ICMP redirection packets that carry malicious traffic."

I think the important question that should be asked here is "How can they tell?" Do they not accept redirections and thus not comply with the standard, or do they have a central place they connect and get such updates from. If so you just have to redirect that first! Reminds me of The Invention of Lying.

Re: The only jewelry I wear is my Wedding ring.

Re: Some perspective on this

At least part of it is probably because NASA's COTS program was for more than just one entry, they wanted a competition going, so you kinda had to have other new entrants? Not sure, but I think the legacy folks were excluded from bidding?

Re: In this case, it's not the technology.

If it's just cargo (human spaceflight DOES NOT like rockets you can't shut off if an anomaly occurs), ATK was offering all-solid boosters that can fill the role and give Orbital time to bring a new engine online. Maybe the AR-1 that Aerojet Rocketdyne is offering, that'd put them up pretty well.

Really, as soon as this Antares blew, the AJ-26 was dead and the program was on the ropes. Combined with the test stand explosion due to corrosion cracking / old metal, their entire supply of engines is now suspect, and testing didn't catch either fault. It's like the Minotaur fairing issues but from the other direction.

Nice icon...

Really?

"Many retailers have already seen the benefits and are delighting their customers at over 220,000 locations."

Bless me. I can't find the comic, but I seem to remember one about some card that got the user off when swiped through the reader. This is the only way I can visualize someone being justified in describing paying for tat using this language, and I don't think that's a feature even of the iPhone 6 "Size Matters" edition.

Re: Freetard redux?

No, actually it's more like having your television suddenly stop displaying any inputs. Cable, aerial, USB pictures. What's going on? You have no clue, you can't take it back as it's out of warranty. Oh, here's a news story, some company is saying that your tv has a counterfeit part in it, and that as a result they've disabled all its inputs. Have fun with your new flat lamp.

No matter whose due dilligence failed, they are going to have a very hard time tracking this down, or even determining where those chips came from. Meanwhile, YOUR stuff now does not work, and you have little recourse.

Stop thinking like an uber-geek. You need to be thinking like an end-user about this. Nobody outside of this forum and frequenters of perhaps a handful of other tech sites would know about this unless it manages to go huge online. Yon End User plugs the device in, it stops working, they have no way to find out why unless they think to go digging way into device properties. When is the last time you looked at a USB ID just because?

It is effectively bricked, for the average person's level of skill. Copy or not, this falls squarely into the Computer Misuse Act as malicious software.

Also!

I'm not sure about anyone else, but the more I hear this sort of thing from them, the more I think "Good" and look for more things I can encrypt. Because obviously they need for their base level of difficulty to be a lot higher to make them focus their resources where they're actually needed, instead of getting into everything just because they can.

Re: Spyware, spyware, spyware

So, cheap, old Android phone produced as an exercise in how weak of hardware will take crapware and still boot is behaving badly. Got it. Seems to compare well with the complaints about how long in the tooth (read: unuseable) the iPhone 3S got after iOS for the iPhone 5 came out. Anyway!

You might check the Moto G and maybe E, especially if you can get the Play Edition direct from Google. Direct updates, no carrier crap to get in the way and cause instability. They're as cheap as you can reasonably get a good smartphone off-contact, and Motorola seems to be on top of their game with updates for what does go through them. Reportedly might have beat the Nexus phones to one of the 4.4.X updates.

This reminds me of...

One of my senior projects for undergrad. Combining a strain gauge and normal optical tracking to cut the amount of motion needed to move the cursor while still maintaining the full control that a mouse gives you. A nice thing if you don't want to set the sensitivity so twitching snaps your cursor to the far side of the screen, and you haven't got a ton of space to be scrolling way over to the side. Also less lift-and-place while circle-strafing the boss (in game, though it might be against your boss!).

Re: "a tool Microsoft uses to hide its source code from being copied"

" I'm just trying to imagine what would happen to the file system of a regular Windows PC if it had to deal with its configuration as a billion tiny files instead of the big hulking mess that the registry is."

Hmm. I rather think it'd read the configuration for the program when (if) it loads it up, like any sane person would do. The individual files are a million times smaller than the registry, so it's a doddle.

The Windows Registry is rather like memorizing the entire contents of your library instead of just looking at the table of contents for the book you want when you pick it up.

Hate to Say It But...

I kinda agree with his lawyer. There have been too many bad apples brought to light, too much talk of being trained to construct "artificial" evidence trails for them to be worthy of trust, especially if things actually are rather vague about the circumstances under which all this was uncovered. It's much, much too close to the shenanigans that China and other such countries pull with their fully monitored networks.